Researchers analysed WPA2 4-way handshake via symbolic execution to find weaknesses
Found a number of issues including a decryption oracle
In this case, the would decrypt but not authenticate frame and then could allow recovery of the group key via a timing side-channel
In theory, allows an unauthenticated attacker to recover WPA2 group key via frame manipulation when used with TKIP
NOTE: is not advised to use TKIP in practice anyway (should use WPA2/CCMP) and so should have limited applicability
In practice, due to large number of attempts needed to recover the full key, this is impractical (especially given that the group key is changed periodically)
mirror protocol in apt allows to specify a list of mirrors to try rather than just a single mirror in source.list
not enabled by default
in APT 1.6 this was reworked and a bug introduced
on fallback from one mirror to the next, the previous mirrors InRelease file would be used without checking the one from the new mirror
hence failing to authenticate the one from the new mirror
could potentially allow installation of untrusted packages BUT would need at least two mirrors to be compromised AND for the user to have setup use of multiple mirrors in the first place